Skip to main content

Showing 1–10 of 10 results for author: Ylianttila, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2212.01298  [pdf, other

    cs.CR cs.NI

    5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network

    Authors: Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, **oh Kim, Jonghyun Kim, Mika Ylianttila

    Abstract: With a plethora of new connections, features, and services introduced, the 5th generation (5G) wireless technology reflects the development of mobile communication networks and is here to stay for the next decade. The multitude of services and technologies that 5G incorporates have made modern communication networks very complex and sophisticated in nature. This complexity along with the incorpora… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    Comments: Link to the Dataset http://ieee-dataport.org/10203

  2. arXiv:2007.04705  [pdf, other

    cs.NI cs.AI cs.LG

    Challenges of AI in Wireless Networks for IoT

    Authors: Ijaz Ahmad, Shahriar Shahabuddin, Tanesh Kumar, Erkki Harjula, Marcus Meisel, Markku Juntti, Thilo Sauter, Mika Ylianttila

    Abstract: The Internet of Things (IoT), hailed as the enabler of the next industrial revolution, will require ubiquitous connectivity, context-aware and dynamic service mobility, and extreme security through the wireless network infrastructure. Artificial Intelligence (AI), thus, will play a major role in the underlying network infrastructure. However, a number of challenges will surface while using the con… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

  3. arXiv:2004.11665  [pdf

    cs.CR cs.NI

    6G White paper: Research challenges for Trust, Security and Privacy

    Authors: Mika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Hewa, Madhusanka Liyanage, Ahmad Ijaz, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar , et al. (2 additional authors not shown)

    Abstract: The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the… ▽ More

    Submitted 30 April, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

  4. Edge computing server placement with capacitated location allocation

    Authors: Tero Lähderanta, Teemu Leppänen, Leena Ruha, Lauri Lovén, Erkki Harjula, Mika Ylianttila, Jukka Riekki, Mikko J. Sillanpää

    Abstract: The deployment of edge computing infrastructure requires a careful placement of the edge servers, with an aim to improve application latencies and reduce data transfer load in opportunistic Internet of Things systems. In the edge server placement, it is important to consider computing capacity, available deployment budget, and hardware requirements for the edge servers and the underlying backbone… ▽ More

    Submitted 10 May, 2021; v1 submitted 17 July, 2019; originally announced July 2019.

    Journal ref: Journal of Parallel and Distributed Computing, Volume 153, 2021, Pages 130-149

  5. Orchestrating Service Migration for Low Power MEC-Enabled IoT Devices

    Authors: Jude Okwuibe, Juuso Haavisto, Erkki Harjula, Ijaz Ahmad, Mika Ylianttila

    Abstract: Multi-Access Edge Computing (MEC) is a key enabling technology for Fifth Generation (5G) mobile networks. MEC facilitates distributed cloud computing capabilities and information technology service environment for applications and services at the edges of mobile networks. This architectural modification serves to reduce congestion, latency, and improve the performance of such edge colocated applic… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

  6. arXiv:1811.04299  [pdf, other

    cs.NI

    Micro-Operator driven Local 5G Network Architecture for Industrial Internet

    Authors: Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Jaspreet Singh Walia, Marja Matinmikko-Blue, Mika Ylianttila

    Abstract: In addition to the high degree of flexibility and customization required by different vertical sectors, 5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links. The novel concept called micro-operator (uO) enables a versatile set of stakeholders to operate local 5G networks within their premises with a guaranteed quality and reliability to complemen… ▽ More

    Submitted 10 November, 2018; originally announced November 2018.

    Comments: 8 pages, IEEE Wireless Communications and Networking Conference (WCNC) 2019

  7. arXiv:1811.04283  [pdf, other

    cs.NI

    Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs

    Authors: Archana Rajakaruna, Ahsan Manzoor, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila, Andrei Gurtov

    Abstract: The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing capabilities of sensor networks. In this paper, we introduce a system model that enables end-to-end s… ▽ More

    Submitted 14 March, 2019; v1 submitted 10 November, 2018; originally announced November 2018.

    Comments: 6 pages, 2nd Workshop on Intelligent Computing and Caching at the Network Edge of the IEEE WCNC 2019 conference

  8. arXiv:1811.02276  [pdf

    cs.CR cs.NI

    Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing

    Authors: Ahsan Manzoor, Madhsanka Liyanage, An Braeken, Salil S. Kanhere, Mika Ylianttila

    Abstract: Data is central to the Internet of Things (IoT) ecosystem. Most of the current IoT systems are using centralized cloud-based data sharing systems, which will be difficult to scale up to meet the demands of future IoT systems. Involvement of such third-party service provider requires also trust from both sensor owner and sensor data user. Moreover, the fees need to be paid for their services. To ta… ▽ More

    Submitted 8 March, 2019; v1 submitted 6 November, 2018; originally announced November 2018.

    Comments: Accepted to publish in proceeding of 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)

  9. Survey on Multi-Access Edge Computing for Internet of Things Realization

    Authors: Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, Tarik Taleb

    Abstract: The Internet of Things (IoT) has recently advanced from an experimental technology to what will become the backbone of future customer value for both product and service sector businesses. This underscores the cardinal role of IoT on the journey towards the fifth generation (5G) of wireless communication systems. IoT technologies augmented with intelligent and big data analytics are expected to ra… ▽ More

    Submitted 17 May, 2018; originally announced May 2018.

    Comments: Submitted to IEEE Communications Surveys & Tutorials

    Journal ref: Published in: IEEE Communications Surveys & Tutorials ( Volume: 20 , Issue: 4 , Fourthquarter 2018) Page(s): 2961 - 2991

  10. arXiv:1801.10295  [pdf, other

    cs.CY cs.CR

    A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain

    Authors: Yining Hu, Ahsan Manzoor, Parinya Ekparinya, Madhusanka Liyanage, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne, Mika E Ylianttila

    Abstract: Banking as an essential service can be hard to access in remote, rural regions where the network connectivity is intermittent. Although micro-banking has been made possible by SMS or USSD messages in some places, their security flaws and session-based nature prevent them from a wider adoption. Global level cryptocurrencies enable low-cost, secure and pervasive money transferring among distributed… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.